by Sergio Duarte Torres, Djoerd Hiemstra and Pavel Serdyukov.
In this paper we analyze queries and sessions intended to satisfy children’s information needs using a large-scale query log. The aim of this analysis is twofold: i) To identify differences between such queries and sessions, and general queries and sessions; ii) To enhance the query log by including annotations of queries, sessions, and actions for future research on information retrieval for children. We found statistically significant differences between the set of general purpose and queries seeking for content intended for children. We show that our findings are consistent with previous studies on the physical behavior of children using Web search engines. Read the poster paper.
by Frans van der Sluis, Sergio Duarte Torres, Djoerd Hiemstra, Betsy van Dijk, Frea Kruisinga
Children experience several difficulties retrieving informa- tion using current Information Retrieval (IR) systems. Particularly, chil- dren struggle to find the right keywords to construct queries given their lack of domain knowledge. This problem is even more critical in the case of the specialized health domain. In this work we present a novel method to address this problem using a cross-media search interface in which the textual data is searched through visual images. This solution aims to solve the recall and recognition problem which is salient for health information, by replacing the need for a vocabulary with the easy task of recognising the different body parts. Read the paper.
by Sergio Duarte Torres, David Becerra Romero, Luis Niño and Yoan Pinzon.
In this paper, a novel method for image encryption based on a Generalized Chinese Remainder Theorem (GCRT) is presented. The proposed method is based on the work developed by Jagannathan et al. Some modifications are proposed in order to increase the method’s encryption quality and its robustness against attacks. Specifically, the inclusion of a vector to reduce the segment pixel space and a Generalized Chinese Remainder Theorem (GCRT) algorithm are proposed. These vectors are generated randomly which allows its use as private keys joining these unrestricted key values generated by the GCRT algorithm. An analysis to study a system where the RGB channels are independently encrypted is performed. Some experiments were carried out to validate the proposed model obtaining very promising results. Read the paper.